Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


  1. Sign-in to the Aruba Administration console usually available at


  2. Navigate to Network -> Edit and open configuration settings of a network that should be protected with a Captive Portal with RADIUS authentication - aruba qa in our example.


  3. Configure Client IP & VLAN Assignment. In our example, we keep the default settings.

    • Navigate to the Security tab and configure Security Level:

    • Splash page type: External

    • Captive portal profile: qa in our example

    • Auth server 1: qa in our example

    • Accounting: Use authentication servers

    • Encryption: Disabled

      Provide us ( with the public IP of your UniFi controller. The RADIUS servers need to be able to directly connect to  your Controller (SW, Cloud Key) to authorise connecting devices. Controller URL is usually in format like this https://your_public_static_ip:8443. Make sure it is the PUBLIC IP address and it's reachable through the Internet (not internal address like 192.168.*.*, 172.16.*.*, or 10.*.*.*). You might need to configure port forwarding on your Internet router and firewall. If you are not sure, please consult with your ISP provider.

  4. Click on the Edit button next to the Captive portal profile and enter values from the IronWifi console:

    Type: Radius Authentication
    IP or hostname (XYZ is the subdomain of your account as found in System > Spaces > your space name > Web Address.)
    URL: /en/splash
    Port: 443
    Use https: Enabled
    Captive Portal failure: Deny internet
    Automatic URL Whitelisting: Enabled
    Redirect URL: empty


    Image Modified




Click on the Edit button next to the Auth server 1 and enter values from the IronWifi console:

IP address: in our example
Auth port: 5701
Accounting port: 5702
Shared key: xxxxxxxxx

aruba_external_radius6Image Modified

Click on the Walled garden link and enter values from the RADIUS server.

White list: all IP addresses and host-names from the IronWifi console

aruba_walled_garden7Image Modified

By default, Aruba controller will intercept HTTPS traffic to all external servers breaking SSL connections. To prevent this, we need to create new Role permitting TCP connections to port 443 on external servers -,, etc.

allow httpsImage Modified

Enable the Assign pre-authentication role and select create role. Click on the Finish button to apply new settings.

pre-authenticationImage Modified

To fix the SSL error, you will need to replace default invalid certificate.

You can generate a valid SSL certificate for free on this URL - You can let the page generate a certificate signing request for you, or visit the following page for detailed instructions on how to generate a request manually - Don't use a wildcard SSL certificate.

Copy content of downloaded files certificate.crt, ca_bundle.crt and private.key to a single file (aruba.pem).

Upload this file to your Aruba IAP - click on Maintenance -> Certificates.

Certificate type: Captive portal server certificate

Certificate format: PAM

Image Modified

Click on the Upload Certificate button to apply new settings.